A tag is a keyword or label that categorizes your question with other, similar questions. Using the right tags makes it easier for others to find and answer your question.
Type to find tags: |
encryption× 605
the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
|
cryptography× 553
the practice and study of logical means used to achieve information confidentiality, integrity and authenticity. It covers, among other things, encryption (making some data unreadable …
|
network× 490
Network Security - securing network infrastructure and connections
|
web-application× 485
accessed over a network such as the Internet or an intranet using a browser.
|
passwords× 464
Specific to the security of passwords: hashing, entropy, cracking, resets, lockouts, etc.
|
ssl× 430
SSL (Secure Sockets Layer) and/or TLS (Transport Layer Security)
|
authentication× 414
Authentication - establishing the authenticity of a person or other entity. Not to be confused with authorization - defining access rights to resources.
|
appsec× 390
Application security - Specific to securing an application rather than the connection, infrastructure, browser etc
|
windows× 262
A family of graphical operating systems produced by Microsoft. Windows includes both server and destop operating systems. Early versions relied on MS-DOS while current versions have evolved from Windo…
|
hash× 241
a function which takes a variable size input and produces a fixed size output. The algorithm tries to make it difficult to predict the output for a given input, find two inputs wit…
|
web-browser× 205
an application which uses http and related protocols to retrieve HTML and XML data from servers. As the web has become a critical source of information and communication, web browsers…
|
certificates× 204
A piece of data used in public key cryptography that contains identifying information (i.e. email address or web address), a hash of a public key, and a digital signature that authenticates the data i…
|
attacks× 199
An attempt by a threat to exploit a weakness in a system.
|
penetration-test× 188
An attempt to penetrate a system's security in an effort to evaluate the protections in place.
|
linux× 186
Securing Linux systems and applications; understanding Linux security features.
|
firewalls× 166
Concerned with software or hardware firewalls
|
malware× 155
any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator…
|
email× 155
Related to email protocols, clients, servers, content, and message format.
|
php× 151
Security aspects concerning code written in the programming language PHP which is often used for web applications.
|
webserver× 149
to deliver web pages on request to clients.
|
privacy× 143
The attribute of a system that prevents the release of data to unauthorized individuals.
The ability or expectation of an individual or group to reveal information about themselves selectively or n…
|
mobile× 142
Security in mobile devices. Issues concerning regular cellphones, smartphones, tablet computers and other portable information devices all fit into this category.
|
wifi× 141
Security for 802.11 wireless networks.
|
password-management× 138
The functions performed by the person or processes responsible for security of passwords on a given system.
|
exploit× 118
The data, tools, and procedures which, when applied to a specific vulnerability, predictably violate the security design of a system.
|
operating-systems× 115
the software component that provides abstraction of physical hardware, and provides a generalized model for application software to execute without the need for specific hardwa…
|
attack-prevention× 112
prevention of an attack vector (e.g. XSS, HPP, CSRF)
|
known-vulnerabilities× 102
known to the designers, implementers, or operators of the system, but has not been corrected.
|
public-key-infrastructure× 99 |
virus× 98
a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
|
key-management× 98
Key management involves the entire key life-cycle: generation, exchange, storage, safeguarding, use, vetting, revocation, replacement and retirement.
|
http× 97
Definition: HTTP - the Hypertext Transfer Protocol - provides a standard for Web browsers and servers to communicate. The definition of HTTP is a technical specification of a network protocol that sof…
|
tools× 94
Tools used by security professionals
|
access-control× 91
A security mechanism which enforces policy describing which requesters may perform operations on specified objects. There are typically multiple types of operations. Common operations include: read, w…
|
javascript× 90
The common name for the language used primarily for scripting in web browsers. It is not related to the Java language. Standardized as ECMAScript, its dialects/implementations include JavaScript and J…
|
xss× 89
Cross-Site Scripting: An attack method that involves injection of code or markup into a webpage.
|